|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Jason Andress (CISSP, ISSAP, CISM, GPEN) , Jason Andress (CISSP, ISSAP, CISM, GPEN) , Jason Andress (CISSP, ISSAP, CISM, GPEN) , Jason Andress (CISSP, ISSAP, CISM, GPEN)Publisher: Syngress Media,U.S. Imprint: Syngress Media,U.S. Edition: 2nd edition Dimensions: Width: 19.10cm , Height: 1.50cm , Length: 23.50cm Weight: 0.480kg ISBN: 9780128007440ISBN 10: 0128007443 Pages: 240 Publication Date: 14 July 2014 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of Contents1. What is Information Security? 2. Identification and Authentication 3. Authorization and Access Control 4. Auditing and Accountability 5. Cryptography 6. Legal and Regulatory Issues 7. Operations Security 8. Human Element Security 9. Physical Security 10. Network Security 11. Operating System Security 12. Application SecurityReviews...can best serve as a precursor to the issue of information security, as it introduces various threat perceptions and related topics in a manner that is easy to understand. --Computing Reviews,December 31,2014 Author InformationJason Andress (CISSP, ISSAP, CISM, GPEN) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics. Tab Content 6Author Website:Countries AvailableAll regions |